I've carried out a close reading of the "worm" in the CSA Mandelzoom source code: this is the code that distributes itself across a Transputer network and then loads and executes programs distributed to it by a host computer. The worm itself is notspecific to Mandelzoom --- you could use it to load other programs if you wanted to.
The network initialisation and worm code are in three files, executed in this order:
SRESET.TAL -- reset the Transputer network
FLBOOT.TAL -- main worm and bootstrap loader
FLLOAD.TAL -- full loader for larger programs
I've annotated these source files with a play-by-play of what the worm is doing. The annotated files are found at the gist link below, regrettably in the opposite order to what's listed above:
https://gist.github.com/stepleton/e0181ecd11ade19124a2956da614caab
I hope this might be of interest to the rare enthusiast out there,
--Tom
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 339 |
Nodes: | 16 (2 / 14) |
Uptime: | 05:43:33 |
Calls: | 7,486 |
Files: | 12,704 |
Messages: | 5,635,662 |